An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
We present an approach to keyhole plan recognition which uses a dynamic belief (Bayesian) network to represent features of the domain that are needed to identify users’ plans and...
David W. Albrecht, Ingrid Zukerman, Ann E. Nichols...
ion suffices ("decide which type you want and provide a full set of operations for each type"). If the application domain is, say, the administration of a university, the...
Abstract. In this paper the focus is on object-oriented analysis of information systems. We assume that the communication within an application domain can be described by a logbook...
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
: In this paper we discuss different aspects of system reconfiguration and their relation to the specific requirements from the application domain. Two projects
Andreas Herkersdorf, Christopher Claus, Michael Me...
Mobility models have traditionally been tailored to specific application domains such as human, military, or ad hoc transportation scenarios. This tailored approach often renders a...
Alberto Medina, Gonca Gursun, Prithwish Basu, Ibra...
We present a planner for the Combat Power Management (CPM) problem. In response to multiple simultaneous or sequential threats, the planner generates a set of local plans, one for...
Abder Rezak Benaskeur, Froduald Kabanza, Eric Beau...